Post

Security Breaches: Is Your Small Business Safe?

Since the announcement of the Target security breach in December of 2013, a string of similar intrusions have affected retailers including Home Depot, SuperValu, Kmart, Goodwill, UPS Stores, Dairy Queen, and Jimmy Johns. In fact, SuperValu announced on September 29, 2014 that they had experienced a second intrusion separate from their August 14, 2014 announcement. It seems that no retailer is safe, …

Security Breaches: Is Your Small Business Safe? Read More »

Identity Theft and Credit Card Theft – What’s the Difference?

With the recent spree of credit card breaches, the press has used the terms “identity theft” and “credit card fraud” together so frequently that the two crimes have become synonymous. However, there is a distinct difference between these two crimes. While credit card fraud is a form of identity theft, true identity theft is far more serious. …

Identity Theft and Credit Card Theft – What’s the Difference? Read More »

Understanding Chip & PIN and P2PE

As credit card fraud has increased in recent months, merchants have worked towards replacing the traditional magnetic stripe credit card with the more secure “Chip & PIN“, “encrypted swipe”, or “EMV” solution. As the momentum builds towards this enhanced security solution for card transactions, it’s worthwhile to understand what this new technology means for consumers …

Understanding Chip & PIN and P2PE Read More »

Social Engineering: The Art of The Con

When securing critical systems and sensitive data, companies immediately think of firewalls, intrusion prevention systems, anti-virus software, and other similar protections. Although these safeguards are essential to overall information security, companies tend to overlook what has evolved into the weakest link in the security chain: the company employees. By neglecting to include employees when considering …

Social Engineering: The Art of The Con Read More »

Social Engineering – Would You Take the Bait?

As a follow-up to our recent blogpost on social engineering, this article explains more about baiting, the specific type of social engineering where criminals use malware-laden devices to manipulate employees into providing access to a company’s sensitive information. Similar to other types of social engineering, baiting relies on an employee’s lapse of judgment to create a weakness …

Social Engineering – Would You Take the Bait? Read More »

pic security standards council logo

Notice: NIST Deems SSL No Longer Acceptable for Secure Communication

The National Institute of Standards and Technology (NIST) has identified the Secure Socket Layers (SSL) v3.0 protocol (a cryptographic protocol designed to provide secure communications over a computer network) as no longer being acceptable for protection of data due to inherent weaknesses within the protocol.  Because of these weaknesses, no version of SSL meets PCI …

Notice: NIST Deems SSL No Longer Acceptable for Secure Communication Read More »

Scroll to Top